Havatra

joined 3 months ago
[–] [email protected] 0 points 22 hours ago

I just now realized that the monkeys have this capability (reference StackOverflow), and this does open for some fun experimentation. Have you by any chance used a userscript for such a purpose before?

[–] [email protected] 2 points 22 hours ago (1 children)

Yeah, a bit of an xy problem, I'll admit. My ultimate goal would be invisible blocking/hiding from certain expected behaviors like the ones anti-adblockers employ. I'm not sure if what I have in mind specifically exists or not, but I find it fun to tweak and experiment with these kind of things. So I don't necessarily have a problem I'd like to solve, it's more an ask for directions/experiences.

I have tried Fiddler before, and it almost has the capabilities I'm looking for (it replaces an entire file; nothing granular), but it was a bit of a hassle to get working well last time I tried it, with the CA certificate, decrypting the TLS and stuff.

[–] [email protected] 1 points 22 hours ago

I haven't heard of ZAP before, so this is new and intriguing! Thanks!

[–] [email protected] 2 points 22 hours ago

uBlock Origin I very much like, and I think it's near-impossible for me to use a browser without it installed anymore. But as far as I know, it's only used for blocking (dropping network requests) and hiding (CSS-like rules), but no manipulation?

The monkeys I've also used a little bit of, but I wasn't aware that they supported being run ahead of the rest of the page like how I wanted, so this is definitely worth looking into, I appreciate it!
For reference, I found this answer on StackOverflow, which is promising.

[–] [email protected] 1 points 23 hours ago (1 children)

I most likely am going a bit to the obscure/convoluted solution, yes.

My goal is to do something to the effect of uBlock Origin, but instead of just blocking/hiding, either replace with local files, or intercept req/res in order to manipulate them favorably, without being detected. I don't know what uBlock does under the hood though, apart from its resource blocking and CSS-derived hiding.

Example:
Watching a video on youtube, an ad is about to get loaded, but instead of the hiding/blocking strategy uBlock uses, intercept the GET/POST, save the important flags that are uniquely served to your device that would indicate that you have successfully been served the ad, drop the rest, and then answer with what would be a valid response for "I have watched the ad in its entirety".
So the server basically saying "Here, I give you this page and this script with both vital and ad contents. I now expect you to provide the corresponding hash that these two files will create through a series of functions. If you don't, I will assume you're blocking me, and I won't provide further contents.", and I'll simply respond with "Here's your hash! *wink*".

Essentially, I wish to experiment with trying to be completely invisible in the blocking, by providing responses as if I have loaded and watched the ad, with all anti-adblock implementations through scripts and dynamic loading "intact" and unaware.


You're quite right, I should include my goal in the post - editing it in now.

 

cross-posted from: https://lemmy.zip/post/42291691

Good day! I'm looking for is a way of creating rules to intercept, modify, drop, and replace HTTP requests and responses, hopefully even with regex(or similar) capabilities.

The best extension I've found that seems to suit those needs is Requestly. However, it seems like they have some shady practices of bought/bot reviews, like here on AlternativeTo.net, where you can see the review are made by accounts that are created the same day of the review, and never used since. The same pattern can be found on ProductHunt.
Is there perhaps an audit of their Github repo somewhere?

I've also looked at apps like mitmproxy, but I was hoping for a solution that is in-browser.

I know that Firefox and Chromium has the built-in dev tools for this, but this is only applied with the dev tools actively open; I'm looking for a more persistent solution.

Please let me know if this is not the place to ask, and if there are other places I should try and look instead/also.

 

Good day! I'm looking for is a way of creating rules to intercept, modify, drop, and replace HTTP requests and responses, hopefully even with regex(or similar) capabilities.

The best extension I've found that seems to suit those needs is Requestly. However, it seems like they have some shady practices of bought/bot reviews, like here on AlternativeTo.net, where you can see the review are made by accounts that are created the same day of the review, and never used since. The same pattern can be found on ProductHunt.
Is there perhaps an audit of their Github repo somewhere?

I've also looked at apps like mitmproxy, but I was hoping for a solution that is in-browser.

I know that Firefox and Chromium has the built-in dev tools for this, but this is only applied with the dev tools actively open; I'm looking for a more persistent solution.

Please let me know if this is not the place to ask, and if there are other places I should try and look instead/also.


Edit

My goal is to do something to the effect of uBlock Origin, but instead of just blocking/hiding, either replace with local files, or intercept req/res in order to manipulate them favorably, without being detected. I don’t know what uBlock does under the hood though, apart from its resource blocking and CSS-derived hiding.

Example: Watching a video on youtube, an ad is about to get loaded, but instead of the hiding/blocking strategy uBlock uses, intercept the GET/POST, save the important flags that are uniquely served to your device that would indicate that you have successfully been served the ad, drop the rest, and then answer with what would be a valid response for “I have watched the ad in its entirety”. So the server basically saying “Here, I give you this page and this script with both vital and ad contents. I now expect you to provide the corresponding hash that these two files will create through a series of functions. If you don’t, I will assume you’re blocking me, and I won’t provide further contents.”, and I’ll simply respond with “Here’s your hash! wink”.

Essentially, I wish to experiment with trying to be completely invisible in the blocking, by providing responses as if I have loaded and watched the ad, with all anti-adblock implementations through scripts and dynamic loading “intact” and unaware.

[–] [email protected] 6 points 2 days ago (1 children)

Depends on the conditions, I'd say. If you have an area that has low oxygen and high saline concentration, one could potentially preserve large parts of the carcass. A big challenge though is the substances brought by the carcass itself, like enzymes and bacteria that are not directly exposed to the oxygen-deficient saline-abundant water, which can thrive and remain active for a long period of time. However, if this carcass sinks to incredible depths, where the pressure is really high, temperature is a constant 4 degrees, very low concentration of scavengers or thriving organisms, and potentially sinks a bit into the sediment for a long time, you'll essentially get ~~pickle juice~~ fossil fuel.

[–] [email protected] 2 points 3 days ago* (last edited 3 days ago)

They only recently made it mandatory for three visa types, but since introduced in October 2016, it's always been an optional field when applying for an ESTA.

Edit:
Not that not providing your social media handle will benefit you, of course.

[–] [email protected] 2 points 3 days ago (1 children)

Do you often (if at all) run into conflicts with the .. alias? I can't think of any case on top of my head, but it feels a bit sketchy. The more than 2 dots however I imagine is pretty safe.

[–] [email protected] 3 points 4 days ago

Depends on the level of technology you're willing to go to:

Smart phones today you're probably all out of luck, whether it's Google's Android, Huawei's HarmonyOS, or Apple's iOS. Same with any desktop PC.
Dumb phones without internet connectivity, like the Mudita Pure, can get you pretty far, but as you're making calls and sending texts through your telecall provider, your provider might use that data for training purposes still.

For other technological devices, like fitness trackers, TVs, cars, fridges, or any IoT device really, that somehow either connects to internet or syncs to a device with such capability (your phone) in order to phone home, you're likely out of luck.
Dumb devices, like mechanical timepieces, monitors, and "normal refridgerators" can get you pretty far, but remember that your purchases of these things, along with all the metadata of those purchases, might also be tracked and trained on.

[–] [email protected] 3 points 1 week ago

As [email protected] pointed out, this 1000-fold increase is compared to barium titanate by itself, not to standard silicium solutions. However, it's still worth pointing out:

Panels made with this technology could be much more efficient and require less space than current silicon-based solar cells,
(...)
The material is also simpler to manufacture and more durable, as it does not require special packaging.

[–] [email protected] 12 points 1 week ago

I have a slight feeling that they will require "proof" of no existing social media profile: Either you give them something, anything, or they will try and search the web for any account that matches your identity.

And of course, if your cooperation is unsatisfactory, they reserve the right to deny you entry.

view more: next ›